securing yourself in the cyber world

24
Emil Tan Team Lead, Co-Founder http://edgis-security.org @EdgisSecurity Securing Yourself in the Cyber World

Upload: emil-tan

Post on 27-May-2015

56 views

Category:

Technology


3 download

DESCRIPTION

Edgis Sharing Session – Securing Yourself in the Cyber World at Dunearn Secondary School (Lower Secondary) August, 2013

TRANSCRIPT

Page 1: Securing Yourself in the Cyber World

Emil Tan

Team Lead, Co-Founder

http://edgis-security.org

@EdgisSecurity

Securing Yourself in the Cyber World

Page 2: Securing Yourself in the Cyber World
Page 3: Securing Yourself in the Cyber World

Limit your Personal Information that you put Online

Review your Online Identity Regularly

Page 4: Securing Yourself in the Cyber World

Install Security Software

Keep your Device & Software Updated

Do not Install Unknown Software

Use Strong Password

Limit your Connectivity when not in use

Page 5: Securing Yourself in the Cyber World

Install Security Software

• Antivirus, Firewall, Backup,

Sites Advisory etc.

• Antivirus, Backup, Locate

Missing Device, Sites

Advisory, etc.

Keep your Device & Software Updated

Do not Install Unknown Software

Use Strong Password

Limit your Connectivity when not in use

Page 6: Securing Yourself in the Cyber World

Install Security Software

Keep your Device & Software Updated

• Operating System

• Software

• Operating System

• Apps

• Firmware

Do not Install Unknown Software

Use Strong Password

Limit your Connectivity when not in use

Page 7: Securing Yourself in the Cyber World

Install Security Software

Keep your Device & Software Updated

Do not Install Unknown Software

• Do not download & install

software from untrusted

sources

• Do not download & install

apps from untrusted sources

• Do not jailbreak your phone

Use Strong Password

Limit your Connectivity when not in use

Page 8: Securing Yourself in the Cyber World

Install Security Software

Keep your Device & Software Updated

Do not Install Unknown Software

Use Strong Password

• At least 8 characters long

• Containing both UPPER and lower case, numbers, & symbols

• NOT dictionary words, personal information, guessable patterns

• Change your password regularly

Limit your Connectivity when not in use

Page 9: Securing Yourself in the Cyber World

Install Security Software

Keep your Device & Software Updated

Do not Install Unknown Software

Use Strong Password

Limit your Connectivity when not in use

• Disable WiFi and Bluetooth when not in use

• Do not connect to untrusted networks

Page 10: Securing Yourself in the Cyber World

Malware Phishing

Page 11: Securing Yourself in the Cyber World

Malware (Malicious Software)

Viruses

Trojan Horse Scareware

Worm

Page 12: Securing Yourself in the Cyber World

Malware (Malicious Software)

Page 13: Securing Yourself in the Cyber World

Malware (Malicious Software)

Page 14: Securing Yourself in the Cyber World

Malware (Malicious Software)

Page 15: Securing Yourself in the Cyber World

Malware (Malicious Software)

Page 16: Securing Yourself in the Cyber World

Techniques

Platforms Techniques

• Removable Storage Media

• Email

• Social Media

• Websites

• Fear

• Curiosity

• Trust

Page 17: Securing Yourself in the Cyber World

Phishing

An act to acquire information (e.g. username /

password) by masquerading as a trustworthy entity in

an electronic communication.

Page 18: Securing Yourself in the Cyber World

Phishing

Page 19: Securing Yourself in the Cyber World

Phishing

Pn20.ru/wp-gdt.php?QZNF7LMRCFXQO

Page 20: Securing Yourself in the Cyber World

Phishing

Page 21: Securing Yourself in the Cyber World

Phishing

Page 22: Securing Yourself in the Cyber World

Phishing

Page 23: Securing Yourself in the Cyber World

Techniques

Platforms Techniques

• Removable Storage Media

• Email

• Social Media

• Websites

• Fear

• Curiosity

• Trust

Platforms Techniques

• Email

• Social Media

• Fear

• Curiosity

• Trust

Page 24: Securing Yourself in the Cyber World

Limit your Personal Information that you

put Online

Review your Online Identity Regularly

Install Security Software

Keep your Device & Software Up to Date

Do not Install Unknown Software

Use Strong Password

Limit your Connectivity when not in use

Platforms Techniques

• Wherever YOU are! • Fear

• Curiosity

• Trust